Secondary use of data in EHR systems

Computer Science – Programming Languages

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

40 pages

Scientific paper

We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies - policies based on the future behavior of a program. A novel feature of our approach is that advice is able to analyze the future use of data. We consider a number of different security policies, concerning both primary and secondary use of data, some of which can only be enforced by analysis of process continuations.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Secondary use of data in EHR systems does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Secondary use of data in EHR systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secondary use of data in EHR systems will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-320711

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.